Journals and Conferences of Communications, Networking, Computing and Security

3 minute read

Published:

This page summarizes the journals and conferences for communications, computing and security.

Overview

Journals can be mainly categorized into survey/tutorial-based and technical contribution-based. The latter can be further divided into regular papers (usually longer than eight pages) and letters (less than five pages).

A full list of the magazines and journals of the IEEE Communications Society can be found here.

Survey/Tutorial

Survey and tutorial summarize the recent progress of a particular research area. Read these articles will help grab an overall understanding of the topic, which is very helpful, in particular to beginners.

An differentiation between tutorial and survey can be found at the information for authors of IEEE Communications Surveys and Tutorials. Generally speaking, survey articles aim to provide a comprehensive coverage while tutorial is usually written in a technical-light manner, to be understood even by non-expert.

Communications and Networking

  • IEEE Communications Surveys and Tutorials
  • IEEE Communications Magazine
  • IEEE Wireless Communications
  • IEEE Network
  • IEEE Vehicular Technology Magazine

Security

  • IEEE Security & Privacy

Internet of Things

  • IEEE Internet of Things Magazine
  • IEEE Internet of Things Journal (accept both survey/tutorial and technical papers)

Other

  • Proceedings of IEEE
  • IEEE Access (accept both survey/tutorial and technical papers)

Technical Contributions

Regular Paper

Communications and Networking

  • IEEE Journal on Selected Areas in Communications (JSAC)
  • IEEE Transactions on Wireless Communications (TWC)
  • IEEE Transactions on Communications (TCOM)
  • IEEE Transactions on Vehicular Technology (TVT)
  • IEEE/ACM Transactions on Networking
  • IEEE Transactions on Cognitive Communications and Networking (TCCN)
  • IEEE Open Journal of the Communications Society (Open Access)
  • IEEE Transactions on Machine Learning in Communications and Networking (TMLCN) (Open Access)

Signal Processing

  • IEEE Journal of Selected Topics in Signal Processing (JSTSP)
  • IEEE Transactions on Signal Processing (TSP)

Computing

  • IEEE Transactions on Mobile Computing (TMC)

Security

  • IEEE Transactions on Information Forensics and Security (TIFS)
  • IEEE Transactions on Dependable and Secure Computing (TDSC)

Internet of Things

  • IEEE Internet of Things Journal (IoTJ)

Sensing

  • Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies

Others

  • IEEE Access (open access)
  • IEEE Sensors Journal
  • IEEE Systems Journal

Letters/Correspondence

  • IEEE Communications Letters
  • IEEE Wireless Communications Letters
  • IEEE Networking Letters
  • IEEE Transactions on Vehicular Technology Correspondence

Conferences

ACM

  • SIGCOMM Conference
  • MobiCom: The Annual International Conference on Mobile Computing and Networking (double blind review)
  • MobiHoc: International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing
  • MobiSys: ACM International Conference on Mobile Systems, Applications, and Services (double blind review)
  • SenSys: ACM Conference on Embedded Networked Sensor Systems
  • WiSec: ACM Conference on Security and Privacy in Wireless and Mobile Networks
  • IPSN: ACM/IEEE Conference on Information Processing in Sensor Networks

IEEE

  • IEEE INFOCOM: IEEE International Conference on Computer Communications (double blind review)
  • IEEE SECON: IEEE International Conference on Sensing, Communication and Networking (double blind review)
  • IEEE CNS: IEEE Conference on Communications and Network Security (double blind review)
  • IEEE GLOBECOM
  • IEEE ICC
  • IEEE ICASSP
  • IEEE WCNC
  • IEEE PIMRC
  • IEEE VTC Spring
  • IEEE VTC Fall
  • IEEE SPAWC
  • IEEE Asilomar
  • IEEE GlobalSIP

Best Conferences of the Information Security

  • Oakland Conference: IEEE Symposium on Security and Privacy
  • CCS: ACM Conference on Computer and Communications Security
  • USENIX Security
  • Network and Distributed System Security Symposium (NDSS)

Note

  • Most of the journals and conferences undergo single blind review process, i.e., the authors’ information is available to the reviewers. Some journals, e.g., IEEE TMC, let the authors choose single blind or double blind. Some conferences, e.g., MobiCom, INFOCOM, use double blind review.
  • Most IEEE conferences, IEEE GLOBECOM, ICC, etc., limit the submissions to six pages.